Which two components reduce the attack surface on an endpoint? (Choose two.)
Which type of access control depends on the job function of the user?
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
What is the difference between deep packet inspection and stateful inspection?
Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?
An analyst received a ticket regarding a degraded processing capability for one of the HR department's servers. On the same day, an engineer noticed a disabled antivirus software and was not able to determine when or why it occurred. According to the NIST Incident Handling Guide, what is the next phase of this investigation?
What makes HTTPS traffic difficult to monitor?
A malicious file has been identified in a sandbox analysis tool.
Which piece of information is needed to search for additional downloads of this file by other hosts?
Refer to the exhibit.
Which event is occurring?